Sciweavers

2912 search results - page 149 / 583
» Overlay Networks - Implementation by Specification
Sort
View
SERSCISA
2009
Springer
15 years 10 months ago
A Kademlia-Based Node Lookup System for Anonymization Networks
Node lookup mechanisms constitute an integral part of any overlay network, and hence also of anonymous communication networks. Today, most anonymizers use centralized directories, ...
Benedikt Westermann, Andriy Panchenko, Lexi Pimeni...
ICOIN
2005
Springer
15 years 9 months ago
A Self-organized Authentication Architecture in Mobile Ad-Hoc Networks
Abstract. Network security is considered one of the obstacles that prevent the wide deployment of ad-hoc wireless networks. Among many security problems, authentication is the most...
Seongil Hahm, Yongjae Jung, Seunghee Yi, Yukyoung ...
P2P
2002
IEEE
124views Communications» more  P2P 2002»
15 years 8 months ago
The Multi-Ring Topology - High-Performance Group Communication in Peer-to-Peer Networks
Emerging peer-to-peer applications require efficient group communication. However, current techniques for group communication are not optimal for peer-to-peer networks, which do n...
Markus Junginger, Yugyung Lee
IPPS
2008
IEEE
15 years 10 months ago
NETEMBED: A network resource mapping service for distributed applications
Emerging configurable infrastructures (large-scale overlays, grids, distributed testbeds, and sensor networks among others) comprise diverse sets of computing resources and netwo...
Jorge Londoño, Azer Bestavros
139
Voted
GLOBECOM
2006
IEEE
15 years 9 months ago
Improving Voice and Data Service Provisioning in Cellular/WLAN Integrated Networks by Admission Control
— In this paper, we study the voice and data service provisioning in an integrated system of cellular and wireless local area networks (WLANs). To maximize the overall resource u...
Wei Song, Yu Cheng, Weihua Zhuang, Aladdin Saleh